System.identityHashCode(getAppletContext()) questions

Hi,
I call showDocument(webpage with applet B) within applet A where A and B has equal codebase and archive attributes. Why do I get different results when calling System.identityHashCode(getAppletContext())? Are there any other context identifiers being equal in both contexts?
Thank you in advance!

Well, AppletContext has a getApplets() method, so I'd suggest using that to see if both applets are in it.
As for comparing AppletContext objects...I suppose if you're going to do this, you should do it with .equals(), but I've never tried this, and I'm kind of confused how this will even show up. I mean, how do you get references to both applet objects except by doing something like AppletContext.getApplets()?

Similar Messages

  • How long lasts the unicity (if any) of the System.identityHashCode()?

    How long lasts the unicity (if any) of the System.identityHashCode()?
    I created code that keep track of seen identityhashcodes for instances
    created and unreferenced in a loop.
    **** I was surprised to see that these identityhashcode can be reused! ****
    The language spec says noting about the unicity of those (at any given time) and especially not for periods of tiem.
    Spec menyions that most jvm would use the heap address (which would explain why these identityhashcode could be reused)
    **** The question is:
    At what time is an identityhashcode invalidated and reusable?
    If I have a finalize() method, at which time the object is considered unreferenced, could its identityhashcode be reused while the finalize() is running?
    My problem is that I associated data to an object, in an external diskcache, by a key whose value is the identityhashcode, (trying to make the key unique), and I must garbage collect it.

    Casually? yeah right, 64bit platforms are just a minor
    detail.... ;-)
    I wasn't clear about my hopes. I just hoped that for
    reflecting new architectures, they would had a new
    method
    like System.getUniqueObjectID(Object):long
    Basically, if sun does not add that, it means that
    they beleive the java programmers do not have a need
    for addressing/keying object instances uniquely, and
    we should just do for-loops with "=="....
    I will post an RFE to sun, we'll see.
    Thanks.It is not required that hashCode every return a value larger then an int. There is no requirement that
    two different objects return two different hashCodes. There is only the requirement that if two objects are
    the same then they return the same hashcode. Most 32 bit JVM's do not produce a unique hashCode value
    for all objects. Because of this there is also no need for 64 bit JVM's to return unique hashcodes. Hence
    64 bit JVM's do not need more then an int to represent the hashCode.
    The equals() method (or ==) is used to determine whether two objects are equal. Not the hashCode.
    Increasing the size of hashCode to a long would break a large number of classes in the JDK all of which
    expect an int. HashMap/hashTable/HashSet are the prime users of hashCode. They do not require a value
    larger then int as they use the value to index into an array. Arrays cannot be larger then 2^31 elements
    long. This also will not change on 64 bit JVM's as changing this limitation would break most of the API's.
    matfud

  • I just purchased a new MacPro to replace my existing 2006 MacPro which cannot be undated with the new operating system.  My question is what is the safest way to transfer all my files.  1) simply install my existing 2TB HD into the new Mac Pro or 2)

    I just purchased a new MacPro 3.2GHz Quad-Core Intel Xeon processor to replace my existing 2006 MacPro 2 x 2.66 GHz Dual-Core Intel Xeon because it cannot be undated with the new Lion operating system.
    My question is what is the safest way to transfer all my files to the new computer.  1) simply install my existing 2TB HD into the new Mac Pro, set it as the startup drive, and update its10.7  operating system or 2) or use the migration program.
    I'm concerned that simply installing the existing 2TB HD, I may have issues with it not recognising some infromation written for the old 2 x 2.66 GHz Dual-Core Intel Xeon.

    your new system runs 10.6.8 just fine as has been said and stated many times.
    I would clone it first.
    I would even clone the original system it has.
    And if you have or want to use Lion and then Mountain Lion, fine - I would still keep backups of every OS.
    I am not a fan of putting the OS and Apps plus all the data all on one drive. I like to keep them separate.
    Whatever OS, rerun the last combo update is all and any other updates.
    And by "new Lion" I assume you don't mean 10.7 but "Moutain" 10.8.  Part of me says keep Lion and SL around, and test and try out ML with your apps and other hardware you may have. After too many years, waiting for 10.8.1 - and give everyone time to update their apps and retest.

  • Yoga 2 13 system image backup question

    Hello:
    I just bought a Yoga 2 13" ultrabook with 128Gb solid state drive. I tried to make an initial system image backup according to the steps in the manual, but could not do it. The manual instructs me to use the Novo button to invoke a menu with "System Backup" as an option. There is no such option on the menu. I found a post on this forum that directed another person to use the Windows 8.1 control panel system backup option.
    I did make a Windows 8.1 system image backup, but now I have no idea of what I should do to perform a restore, should I need one.
    Is there a conventional process by which I create a USB bootable disk that can then be used to restore the Windows 8.1 image? Or does the OneKey restore have that as an option?
    Bottom line problem is:
    I need to make a system image backup that I can use to restore all of my partitions, should I need to do so. And I need the procedure for doing the restore.
    Thanks!

    Hi Rudy1212,
    Welcome to Lenovo Community!
    I understand your concern and the OS (Operating System) can only be backed up in a USB Flash Drive. Below is the link to perform the same:
    How to Create a USB Recovery Drive and Use it to Recover Windows 8/8.1?
    Do post us back for further queries
    Best Regards
    Shiva Kumar
    Did someone help you today? Press the star on the left to thank them with a Kudo!
    If you find a post helpful and it answers your question, please mark it as an "Accepted Solution"! This will help the rest of the Community with similar issues identify the verified solution and benefit from it.
    Follow @LenovoForums on Twitter!

  • Forms system potential migration questions.

    We have a forms and reports based system built in 10g.
    We are considering migrating to 11g forms and reports but long term moving to ADF or APEX.
    We are generally a data entry system run on intranet so my prefernence has always been APEX but management are trying to follow the Oracle roadmap which is pushing ADF.
    We are a small outfit so the solution we choose will probably be the one which offers the quickest development times.
    I have signed up for apex.oracle.com to have a play but seems to be taking forever to get approval!
    A few questions re APEX (apologies if these are really simple)
    1) How is user access controlled. Currently all our users login via one SYSDBA user. Our current system has a logon box which then allows access to the screens they can amend. I assume APEX uses the DB user access rights?
    2) How easy is it to deploy fixes etc? We have upwards of 200 customer sites. We currently distribute fmx an RDF files on a monthly basis.
    3) Can you use key strokes? Many customers like the F Keys to be used as quick keys? i.e. in forms F10 can be save, F3 can be clear etc
    4) Can we use our existing database? Although this is many years old and all the correct constraints may not be in place (ie. a few FK/indexes may be missing - but we could try and tidy up pre migration) would it be possible to use this. We are consdiering rewriting the database but most customers will want to bring through their old data and have custom reports built on these so would struggle to rewrite)
    5) How is inheritance handled? In our forms environment all our items are inherited from one point so if we change that one point it follows through the system
    6) I have seen online demo were by people are creating mini databases from spreadsheets. Can it be setup so the users can create things like this without affecting other areas of the system?
    7) Any pros/Cons when comparing to ADF
    8) Any people any fedback from migrating from Forms
    Any feedback at all is greatfully recieved.
    Im looking forward to the online demo.

    Sure Oracle pushes ADF, because it has cost them $$$$$$ and they want to get that back. Apex is part of the database, and as such you already have a license for it. No need for a Weblogic or OAS license.
    seems to be taking forever to get approval!Went pretty fast for me a few years ago. 1-2 days if I remember correctly.
    1) There are pre-built authentication methods, but you can also create your own method (which most people do).
    I assume APEX uses the DB user access rights?As in most web applications, there is only one user that actually accesses the database. And I would never ever make that a SYSDBA user!
    Other users may log in via username/password that can be stored in Apex tables or your own tables. They can also be actual database users. However, since they do not connect to the database, their roles are irrelevant. You may use these roles to check authorization in your application, though.
    2) Apex exports applications in a sql file, so you can deploy applications via sqlplus (or via the Apex administrator page).
    3) The keys are actually browser keys, so you are very limited. You can use some Javascript, but forget about something like F7-F8 combination. It doesn't matter what technology you use, web is different from client/server (or the Forms Java applet). You have to rethink GUI concepts coming from Forms and going to browser applications.
    4) Yes. But like Forms, good database design makes thinks easier (like using wizards).
    5) There are all kinds of places where you can set defaults, templates etc.
    6) Yes.
    7) Google for discussions on ADF vs Apex.
    8) We use it side by side. No plans to recreate Forms as an Apex application.
    Depending on the size of your Forms app, it may take a long time to re-create it in Apex. There are some Forms migration tools in Apex, but I wouldn't use those. They cannot migrate the Forms code anyway, since a browser doesn't understand pl/sql code. As said, you really have to rethink your GUI when moving to a web app.

  • ISight System Requirements (dumb question, but I'm confused)

    Sorry to ask such a purchase-related question, but I'm entirely confused as to whether I can use iSight with my G4 Cube.
    I'm running OS 10.4.3 and have iChat AV installed, but my processor speed is only 500 MHz.
    The information on the actual iSight package is unclear. So, after I was disuaded from buying one at a retail store, I checked the site store. There, the system requirements read:
    "Macintosh computer with a 600MHz or faster PowerPC G3 or any PowerPC G4 or G5 processor."
    I understand this to mean that, for people with G3 PowerPCs, their processor speed must be at least 600 MHz. But any G4 or G5 processor should be adequate.
    However, when I called Apple Customer Service, the representative insisted that this means, no matter what processor you have, its speed must be at least 600 MHz.
    Can someone enlighten me?
    G4 Cube   Mac OS X (10.4.3)   500 MHz processor
    G4 Cube   Mac OS X (10.4.3)   500 MHz processor

     Hello Jason. Different software applications that drive iSight can have different System Requirements.
    There are a lot of choices of Applications You Can Use With iSight. Select the app that performs the function you want and then check its system requirements. Different applications have their own (and possibly different) requirements, so check carefully when considering other software.
    The 600 MHZ requirement is the G3 processor speed minimum System Requirements for iChat AV 2.1. This particular 600 MHz speed requirement applies only to G3 Macs using iChat AV 2.1. ANY G4, including your Cube, can use iSight with iChat AV 2.1.
    However, you are using iChat AV 3. Some of the System Requirements for iChat AV 3 are significantly higher than for version 2.1, but your G4 can still use iSight for one-to one iChat AV 3 video without PowerBoost.

  • PVC2300 - Video Monitoring System (3 urgent questions)

    Hi there,
    I'm pretty sure these questions have been asked before - but could not find answers to these.
    Setup:
    When running a Video Surveillance setup, with up to 16, PVC2300 cameras connected to the Video Monitoring System (LBAVMS16):
    1. Does the PC running LBAVMS16 need to be "on" all the time for the video feed to be stored on a NSS device?
    2. Is there any difference between the "old Linksys" monitoring software and "LBAVMS16"?
    3. Can you run a mixed camera (WVC2300 and PVC2300) environment using "LBAVMS16"?
    I have a partner testing the solution and I would guess they are not the only ones facing these same questions.
    Many thanks in advance!
    Rasmus Almqvist, Territory Market Manager
    Phone: +358 40 774 6719
    Email: [email protected]

    Hello,
    First, you want to use SWVMS16.  Its the newer Small Business Software Video Monitoring System that will work with WVC210, PVC2300, WVC2300, and PVC300 (new).
    http://www.cisco.com/cisco/web/solutions/small_business/products/security/small_business_video_surveillance_cameras/index.html
    The 'latest' version you will find here is 1.0.0, but when we announce the PVC300 orderable, that should go to 1.0.1.
    Please upgrade both the PVC2300 and WVC2300 to 'Camera' FW version 1.0.1 for it to work with SWVMS16.
    This SW is free so just come back and check in the coming weeks for the update.
    The older LBAVMS16 will not support the PVC300 and has the old Linksys SKIN and is actually a different SW completely.   The newer one is the Cisco small business offering we will have going forward.   The older SW would allow you to set up the motion detection and then it would run in the task bar, and it would record as motion occurred, even though it was not open.
    The new SWVMS16 has a concept of a MAIN console (role based access) and after you define the 'Always' on or 'Motion Detection' configuration, you will then need to click on START/STOP in the Recordings GUI Drawer and select START RECORDING SCHEDULE and then all the cameras will have a Green LED indicator on the screen showing they are active and ready and will follow the configuration.   You can minimize it at this point, but you cant close it.  CLosing it will stop the schedule.   The datasheet should show the PC requirements to run this application, and to be honest, if you have more than 4 cameras, this is not a part time task.  Of course, it will depend on the Video quality you set up on each camera, but you will find monitoring 8 cameras will use your CPU and Memory (run the Windows Task manager to see).  This is why for 16 cameras, we recommed a very powerful PC with alot of RAM.
    I am running a Dual Intel Core 2 CPU 6400 @ 2.13GHz Machine with 1 GB or RAM and with 4 cameras at Highest quality it runs at 45-55% CPU utilization, just as an example.    So the point is this PC should be pretty much dedicated to this function of monitoring, recording, playback.
    Now keep something else in mind.  The Cameras (all of ours) dont need the SWVMS16 to do motion detection to NSS, or EMAIL.  The cameras themselves can FTP (client) motion detection (MPEG4 or MJPEG) direct to NSS (FTP server) or SMTP Mail.  Its configured on the Camera.   And with a PC Browser, you can monitor the Camera, or QuickTime, etc.  The SWVMS just makes it easy to monitor them all in one place with all the convenience and functions you would use in a SMB.  So technically SWVMS16 is not needed to operate motion detection to the NSS, but if you are running SWVMS, then yes, it needs to be on.
    In fact, I run BOTH on my cameras.  That is, I have them set to FTP to my NSS, and I also have them monitored by SWVMS.  Our Cameras are dual stream, dual codec, and have no problem with this, and can be monitored from up to 10 HTTP servers as well (RTSP increases that), which is usually enough.
    An interesting twist, which is also practiced and supported, is defining the NSS File Share as the SWVMS16 Video Storage location.  Just another option to consider.
    Hope this clarifies a little?
    Steve DiStefano
    SE US Field Channel

  • Alter system set events Question

    Version 10202 on AIX
    sql> alter system set events '4030 trace name heapdump level 536870917; name errorstack level 3';
    Questions about this statement..
    what this command is doing, i guess creating tracefile for event 4030...& the location of trace file would be the current direcotry?
    & how to setup same kind of event trace for other events, any tips....& what to check in tracefile for problem?

    The values for level I have record are 1, 2, 3, 8, and 32 so I am guessing the number shown is the address of a specific heap to be dumped. The address of a heap would potentially change with a change in the shared pool storage parameters. Where did you get the address value?
    The dump should go to the user background dump destination and not the current directory.
    PS - if you have metalink look at document: #218105.1 Introduction to ORACLE Diagnostic EVENTS
    HTH -- Mark D Powell --
    Message was edited by: MDP add PS to Metalink Doc
    mpowel01

  • SAP WebDispatcher - system requirements & general questions

    Hi all,
    possibly we would like to use the SAP WebDispatcher as reverse proxy for
    our SAP EP infrastructure. Our main goal is to secure accesses from the internet to the sap ep by installing the SAP WebDispatcher in a DMZ.
    Could someone give me information about the hardware/system requirements
    of the SAP WebDispatcher?
    (supported operating systems, recommended CPU / Ram size, is a database necessary (if yes, which is supported))
    Is it possible to restrict the requests to the SAP WebDispatcher from only
    specific IPs or IP-Ranges?
    Just for my curiosity: what's the implementation language of the SAP WebDispatcher.
    Are there any important security vulnerabilities known?
    Any help is really appreciated
    Regards Karin

    Hello,
    Did you make some research in help.sap.com and sapservice.sap.com and the find button on SDN ? Much of the answers for your questions are there waiting for you to read them !
    Anyway,
    The supported OS are the same as Netweaver (Linux, Unixes and Windows), both 32 and 64 bit.
    The hardware requirements are low, but depends obviously of the number of http requests to process per second. For instance we use a Linux x86 biprocessor blade with 2 GB ram, for a moderate load and the cpu load is lower than 3 %...
    There is no database for the sap web dispatcher. what would be its use ??
    Yes it is possible to filter IPs or IP-ranges. Check icm/HTTP/auth_xx parameter and    http://help.sap.com/saphelp_nw04s/helpdata/en/b4/9aa8862e714e6db8e74e48e5d3283b/frameset.htm.
    For the implementation language, the release information for a web dispatcher 7.0 running on Windows 2003 tells me  :
    compiled on NT 5.0 2195 Service Pack 4 x86 MS VC++ 13.10 
    So I guess the language shoul be C++.
    Regards,
    Olivier

  • Discovery System v3 - Installation questions

    Hello all,
    We have the Discovery Server v3, with ERP and SOL instances. Some small questions regarding installation.
    We have a DB size of ~175Gb. Is it normal?
    We have a RAM consumption of 11Gb when both systems are started. Is it normal?
    In the Visual Admin, Server > Services > Destinations doesn't work (class loading exception). Do you experience the same?
    Thanks in advance,
    Francois

    Hi,
    You can access the users+password form of V3 using this link:
    https://www.sdn.sap.com/irj/sdn/go/portal/prtroot/docs/library/uuid/8065c52a-dc37-2a10-0989-a7d17627e2f2
    or by navigating to the "How to setup the Discovery System" page and from there click on the "passwords and logins" link (all the way to the bottom).
    Best regards,
    Amir
    Edited by: Amir Glatt on Jan 29, 2008 3:01 PM

  • System Preferences crashing question.

    Hey guys Ive done a little research as to what is causing my system preferences to crash everytime I open the screensave tab. I got a few, one of them being this one
    One
    Now I used spotlight to look for the plist file, and it gave me one saying com.apple.screensaver.iTunesartwork.(random numbers and letter).plist , and one saying com.apple.screensaver.(random numbers and letters).plist
    Now my question is, which one do I delete? Because after reading the other posts this is only a problem with the iTunes artwork screensavers (which I use), Im really stumped.
    Thanks in advance guys

    Still a problem with that link—it's the same as before!
    Anyway, I found the topic where I saw this before: System Prefernces crashes when I set screensaver to show iTunes artwork . In that topic, Andreas also posted a link to this KB article: System Preferences unexpectedly quits after configuring iTunes Artwork screen saver.
    See if that helps, and yes, a restart is as good as (if not better than) logging out and back.
    As for System Preferences asking you to confirm changes, I've had that in the past. Are you logged in to an Admin account? I wouldn't worry too much about it though, get it working first!

  • Activity Monitor: System Memory. Questions

    Hi apple community. I have a questions about this picture above.
    This is my MBP retina performs in system memory.
    What is the wired thing (mark in color red)?
    Does this lower my mac's performace?
    if it do so, how to prevent things to being wired?
    and also the inactive (mark in color blue)
    what does it do? and does it effect my mac?
    if it looks bad, can u make suggestions for me on what to do to improve my mac performance like brand new?
    i have my mac for 7 months now.
    ur help will be much appreciated.
    Thanks.

    Apple support articles which seem to answer your general questions.
    Memory  - Using Activity Monitor to read System Memory and determine how much RAM is being used
    Memory - Check whether more RAM will improve performance

  • System.in.read and System.out.print questions

    On the following code, two questions:
    1. the output is not what I expected. Why doesn't the System.out.println(i+" "+(char)i); print everytime i press enter a character? It seems to print all at once after everything is entered.
    package stars;
    import java.io.*;
    public class Stars {
      public static void main (String[] args) throws IOException {
        String U="";
        System.out.print("What is your name: ");
        while (true) {
          int i=System.in.read();
          U+=(char)i;
          System.out.println(i+" "+(char)i);
          System.out.flush();
          if (i==10||i==13) break;
        System.out.println("\rHello "+U);
    }C:\>java -cp . stars/Stars
    What is your name: blah
    98 b
    108 l
    97 a
    104 h
    13
    Hello blah
    2. What is the most natural way to check for the press of an enter key? Is there a java attribute or method for the "Enter key" since it is different on unix and ms-dos? Thanks

    On the following code, two questions:
    1. the output is not what I expected. Why doesn't
    the System.out.println(i+" "+(char)i); print
    everytime i press enter a character? From:
    http://scv.bu.edu/Doc/Java/tutorial/java/nutsandbolts/input.html
    ================
    "The read() method provided by System.in reads a single character and returns either the character that was read or, if there are no more characters to be read, -1.
    When a program reads from the standard input stream, the program blocks waiting for you to type something in. The program continues to wait for input until you give it some indication that the input is complete. To indicate to any program that reads from the standard input stream that you have finished entering characters, type the end-of-input character appropriate for your system at the beginning of a new line"
    ================
    In other words, Java can't do what you want to do.
    <snip>
    >
    2. What is the most natural way to check for the
    press of an enter key? Is there a java attribute or
    method for the "Enter key" since it is different on
    unix and ms-dos? Thanks
    System.getProperty("line.separator");Jim S.

  • Shared file system and other questions

    Hi,
              Is shared file system common for all WL in the cluster or each WL has its
              own one.
              Next questin is connected with proxy server.
              I'm not sure if there should be one proxy server for two servers working in
              one cluster or each server should has own proxy server (I mean WL proxy
              server).???
              In my opinion there should be one proxy server which redirect requests to
              server in cluster using some balancing method. But when I read documentation
              about cluster's architectures I saw the picture where each WL cluster server
              had proxy own server. I'm not sure if this picture showed only outline of
              architecture or it was real solution???
              Is it better to install another proxy server (for example Apache) than WL
              proxy server?
              In previous questions I asked if it is possible to replic static classes,
              fields etc. Prasad Peddada told that it is not replicated. But I wonder if
              there exists some method to force replicating it.? Maybe we can implement
              some method and run it?
              Thanks,
              Best regards,
              Robert
              

    Mike.
              In WLS51 cluster, it is better to specify different workingDir for each
              server. You can create a weblogic.properties in your per-server directory
              and add jspc properties in that file.
              Cheers - Wei
              "Mike Reiche" <[email protected]> wrote in message
              news:[email protected]...
              >
              > If you share directories between instances -
              > what happens when two WL instances decide to compile
              > the same JSP at the same time?
              >
              > Mike
              >
              >
              > Viresh Garg <[email protected]> wrote:
              > >
              > >
              > >
              > >
              > >"Robert Zaczyñski" wrote:
              > >
              > >> Hi,
              > >> Is shared file system common for all WL in
              > >the cluster or each WL has its
              > >> own one.
              > >
              > >I am not sure I understand your question. We
              > >recommend using shared file system
              > >for ease of maintanence and to get rid of pain
              > >for versioning problems for
              > >application code. It is not a requirement of
              > >WLS cluster. I really don't
              > >understand what you mean by
              > >"Is shared file system common for all WL in
              > >the cluster or each WL has its
              > >own one
              > >"
              > >
              > >>
              > >>
              > >> Next questin is connected with proxy server.
              > >> I'm not sure if there should be one proxy
              > >server for two servers working in
              > >> one cluster or each server should has own
              > >proxy server (I mean WL proxy
              > >> server).???
              > >> In my opinion there should be one proxy server
              > >which redirect requests to
              > >> server in cluster using some balancing method.
              > >But when I read documentation
              > >> about cluster's architectures I saw the picture
              > >where each WL cluster server
              > >> had proxy own server. I'm not sure if this
              > >picture showed only outline of
              > >> architecture or it was real solution???
              > >
              > >One or more proxy servers can be used. One is
              > >just fine, however you **might**
              > >want to use multiple proxies for heavily loaded
              > >application to avoid contention.
              > >All proxy servers will load balance between
              > >all servers in clsuter. a proxy
              > >servers is not attached or bound to an instance
              > >in cluster.
              > >
              > >>
              > >>
              > >> Is it better to install another proxy server
              > >(for example Apache) than WL
              > >> proxy server?
              > >>
              > >> In previous questions I asked if it is possible
              > >to replic static classes,
              > >> fields etc. Prasad Peddada told that it is
              > >not replicated. But I wonder if
              > >> there exists some method to force replicating
              > >it.? Maybe we can implement
              > >> some method and run it?
              > >
              > >I would recommend that for static classes, you
              > >use context parameters of web
              > >application or something similar, why do you
              > >need to replicate them. WHy not
              > >each cluster instance have a local copy and
              > >use their own copy for such
              > >classes/fields?
              > >
              > >>
              > >>
              > >> Thanks,
              > >> Best regards,
              > >> Robert
              > >
              > >Viresh Garg
              > >Principal Developer Relations Engineer
              > >BEA Systems
              > >
              > >
              > >
              > ><!doctype html public "-//w3c//dtd html 4.0
              > >transitional//en">
              > ><html>
              > >
              > ><p>"Robert Zaczyñski" wrote:
              > ><blockquote TYPE=CITE>Hi,
              > ><br>Is shared file system common for all WL
              > >in the cluster or each WL has
              > >its
              > ><br>own one.</blockquote>
              > >
              > ><p><br>I am not sure I understand your question.
              > >We recommend using shared
              > >file system for ease of maintanence and to get
              > >rid of pain for versioning
              > >problems for application code. It is not a requirement
              > >of WLS cluster.
              > >I really don't understand what you mean by
              > ><br>"<i>Is shared file system common for all
              > >WL in the cluster or each
              > >WL has its</i>
              > ><br><i>own one</i>
              > ><br>"
              > ><blockquote TYPE=CITE>
              > ><p>Next questin is connected with proxy server.
              > ><br>I'm not sure if there should be one proxy
              > >server for two servers working
              > >in
              > ><br>one cluster or each server should has own
              > >proxy server (I mean WL proxy
              > ><br>server).???
              > ><br>In my opinion there should be one proxy
              > >server which redirect requests
              > >to
              > ><br>server in cluster using some balancing method.
              > >But when I read documentation
              > ><br>about cluster's architectures I saw the
              > >picture where each WL cluster
              > >server
              > ><br>had proxy own server. I'm not sure if this
              > >picture showed only outline
              > >of
              > ><br>architecture or it was real solution???</blockquote>
              > >
              > ><p><br>One or more proxy servers can be used.
              > >One is just fine, however
              > >you **might** want to use multiple proxies for
              > >heavily loaded application
              > >to avoid contention. All proxy servers will
              > >load balance between all servers
              > >in clsuter. a proxy servers is not attached
              > >or bound to an instance in
              > >cluster.
              > ><blockquote TYPE=CITE>
              > ><p>Is it better to install another proxy server
              > >(for example Apache) than
              > >WL
              > ><br>proxy server?
              > ><p>In previous questions I asked if it is possible
              > >to replic static classes,
              > ><br>fields etc. Prasad Peddada told that it
              > >is not replicated. But I wonder
              > >if
              > ><br>there exists some method to force replicating
              > >it.? Maybe we can implement
              > ><br>some method and run it?</blockquote>
              > >
              > ><p><br>I would recommend that for static classes,
              > >you use context parameters
              > >of web application or something similar, why
              > >do you need to replicate them.
              > >WHy not each cluster instance have a local copy
              > >and use their own copy
              > >for such classes/fields?
              > ><blockquote TYPE=CITE>
              > ><p>Thanks,
              > ><br>Best regards,
              > ><br>Robert</blockquote>
              > >
              > ><p>Viresh Garg
              > ><br>Principal Developer Relations Engineer
              > ><br>BEA Systems
              > ><br> </html>
              > >
              > >
              >
              

  • System exec call question

    I have a vi that I want to call another executable (i.e. excel) using the
    system exec.vi. I want to run the called application in the background in
    parallel with my vi. When I tried this, I wasnt able to operate my vi, buttons
    pressed but there was no resulting action. i assume its because the other
    application had control. any suggestions?
    chuck

    "chuck" wrote:
    >>Stu wrote>I hate to ask the obvious question, but did you
    have the wait until>completion>set to False? If true, that would have stalled
    that data>flow until the>called application completes.>Stu>>Stu,>>I am probably
    missing something simple, but I am not sure where you set the>'wait until
    completion'. also, I have tried using system exec.vi to call>both a program
    that I had built using labview, and also commercial programs>(i.e. photoshop)just
    to see if it was my program at fault. Both situations>resulted in a hangup.>>chuck
    stu,
    thanks, that was it. On the system exec.vi from labview 5 there wasn't an
    input for 'wait until completion', but I see it on the labview 6 version.
    thanks for the help.
    chu
    ck

Maybe you are looking for

  • How can i show 2 videos at once imovie09?

    How can i show 2 videos at once using imovie 09?

  • E63 GOING ON AND OFF

    I flashed my E63 but after flshing it could not work proberly,it keeps going on and off after every 5min.anybody who can help me.

  • Issue regarding posting period and due date and document date

    Dear Sir, when i am creating sales order/purchase order and in posting date /delivery date/document date  how it is allowing me to add the marketing document of date before 3 months. i have checked the box on document setting block allow posting date

  • Boris FX : differences in packages?

    I intend to purchase one of the packages from Boris FX. I found out there two packages which have similarities : RED en BLUE. I, myself, am not really good in seeing the differences between the packages allthough I believe the BLUE version seems to s

  • Xtreme Audio: chip mystery solved [kind

    This has probably been beaten to death by now, and then some, but what the heck.. here goes anyway. Here are some links high-res close-up photos of an [url="http://www.ixbt.com/multimedia/creative-li've!24bit/card-big.jpg">SB Li've! 24 bit[/url], a [